From Old Ciphers to Modern Communications

Authors

  • Cristina Flaut Faculty of Mathematics and Computer Science, Ovidius University of Constanta, Rumania
  • Daniel Flaut Faculty of History and Political Sciences, Ovidius University of Constanta, Rumania
  • Sarka Hoskova-Mayerova Department of Mathematics and Physics, University of Defence, Brno, Czech Republic
  • Radu Vasile Faculty of Mathematics and Computer Science, Ovidius University of Constanta, Rumania

DOI:

https://doi.org/10.3849/aimt.01281

Keywords:

code, crypto–system, communication

Abstract

The security of the information transmitted, irrespective of the era and the channel selected, has always been one of the main concerns of those using various communication systems. This is particularly the case nowadays, when the Internet has made the mass distribution of any kind of information possible. Codes can be used to transmit data through various noisy channels and any errors that might occur can be corrected; it is therefore very important to design good codes with adequate parameters. This survey briefly outlines the evolution of the ways in which information has been collected, transmitted and used from the past to the present.

Author Biographies

  • Daniel Flaut, Faculty of History and Political Sciences, Ovidius University of Constanta, Rumania

    Faculty of History and Political Sciences

  • Sarka Hoskova-Mayerova, Department of Mathematics and Physics, University of Defence, Brno, Czech Republic

    Faculty of Mathematics and Computer Science,

  • Radu Vasile, Faculty of Mathematics and Computer Science, Ovidius University of Constanta, Rumania

    Faculty of Mathematics and Computer Science,

References

CIALDINI, R. B. Influence: The Psychology of Persuasion. HarperCollins, 1984, 334 p. ISBN 978-0-061-24189-5.

Social Engineering Defined [on-line]. [cited 2018-11-05]. Available from: https://www.social-engineer.org/framework/general-discussion/social-engineeringdefined.

SINGH, S. The Code Book-How to Make it, Break it, Hack it, Crack it. Delacorte Press, 2001, 263 p. ISBN 978-0-385-72913-0.

MARTIN, K. Everyday Cryptography. Oxford: Oxford University Press, 2012, 720 p. ISBN 978-0-198-78801-0.

FLAUT, C. and FLAUT, D. Cryptographic Systems Used in the Romanian Countries between the 15th – 19th Centuries. Asian Journal of Social Sciences & Humanities, 2015, vol. 4, no. 1, p. 109–117. ISSN 2186-8492.

WOBST, R. Cryptology Unlocked. Wiley, 2001. 557 p. ISBN 978-0-470-06064-3.

Encyclopaedia Britannica Online-2 [on-line]. [cited 2018-11-04]. Available from: https://www.britannica.com/place/ United-Kingdom/Elizabethan-society#ref483014.

BALS, S. The Humor Monastery. Bucharest: Meridiane Publishing House, 1965, 30 p.

MARES, A. Old English Writing and Culture [in Rumanian]. Bucarest: Academiei Române, 2005, 486 p. ISBN 978-3-598-20437-1.

Encyclopaedia Britannica Online-3 [on-line]. [cited 2018-10-05]. Available from: https://www.britannica.com/topic/cryptology/Cryptography#ref392519.

KLIMA, R. E. and SIGMON, N. P. Cryptology: Classical and Modern with Maplets. Boca Raton: CRC Press, 2012.

Encyclopaedia Britannica Online-1 [on-line]. [cited 2018-10-14]. Available from: https://www.britannica.com/ biography/Charles-Babbage.

SINGH, S. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. London: Fourth Estate, 1999.

SCHAEFER, E. An Introduction to Cryptography [on-line]. Santa Clara: Santa ClaraUniversity, 2005, [cited 2018-10-14]. Available from: http://cgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto_Lectures/ Schaefer_intro_crypto.pdf.

CHRISTENSEN, C. Cryptanalysis of the Vigenère Cipher: The Friedman Test [on-line]. MAT/CSC 483, 2015. [cited 2018-10-14]. Available from: https://www.nku.edu/~christensen/ 1402%20Friedman%20test%202.pdf.

Encyclopaedia Britannica Online-4 [on-line]. [cited 2018-11-05]. Available from: https://www.britannica.com/ biography/Samuel-F-B-Morse.

Encyclopaedia Britannica Online-5 [on-line]. [cited 2018-11-05]. Available from: https://www.britannica.com/ biography/Guglielmo-Marconi.

Encyclopaedia Britannica Online-6 [on-line]. [cited 2018-11-05]. Available from: https://www.britannica.com/ biography/Alan-Turing.

GROMOV, G. Roads and Crossroads of Internet History [on-line], 1995, [cited 2018-11-05]. Available from: http://history-of-internet.com/history_of_internet.pdf.

GRAHAM, F. Clash of the Titans: Email v Social Media [on-line], 2011, [cited 2018-11-05]. Available from: https://www.bbc.com/news/business-15856116.

KOBLITZ, N. A Course in Number Theory and Cryptography. Springer-Verlag, 2nd edition, 1994, 235 p. ISBN 978-0-387-94293-3.

CASE, M. A Beginner’s Guide To The General Number Field Sieve. Corvallis: Oregon State University, ECE 575, 2003, 19 p.

BUCHMANN, J. Introduction to Cryptography. Springer-Verlag, 2nd edition, 2004, 338 p. DOI 10.1007/978-1-4419-9003-7.

MALEK, M. Coding Theory-Binary Hamming Codes [on-line], 2015, [cited 2018-11-05]. Available from: http://www.mcs.csueastbay.edu/~malek/Class/Hamming.pdf.

MALEK, M. Coding Theory-Golay Codes [on-line], 2015, [cited 2018-11-05]. Available from: http://www.mcs.csueastbay.edu/~malek/Class/Golay.pdf.

LING, S. and XING, C. Coding Theory A First Course. Cambridge:Cambridge University Press, 2004, 222 p. ISBN 978-0-521-82491-9.

MULLER, D. E. Application of Boolean Algebra to Switching Circuit Design and to Error Detection. Transactions of the I.R.E. Professional Group on Electronic Computers, 1954, vol. 3, p. 6–12. https://doi.org/10.1109/IREPGELC.1954.6499441.

BAEZ, J. C. The Octonions. Bulletin of the American Mathematical Society New Series, 2002, vol. 39, no. 2, p. 145–205.

SCHAFER, R. D. An Introduction to Nonassociative Algebras. New-York: Academic Press, 1966, 165 p. ISBN 978-04-86688138.

ALAMOUTI, S. M. A Simple Transmit Diversity Technique for Wireless Communications. IEEE Journal on Selected Areas in Communications, 1998, vol. 16, no. 8, p. 1451–1458. ISSN 0733-8716, https://doi.org/10.1109/49.730453.

PUMPLUN, S. How to Obtain Division Algebras Used for Fast Decodable Space-Time Blocks Codes, Advances in Mathematics of Communications, 2014, 8 (3) : 323-342. https://doi.org/10.3934/amc.2014.8.323, [on-line], 2013, [cited 2018-11-05]. Available from: http://molle.fernuni-hagen.de/~loos/jordan/archive/iteralg/iteralg.pdf.

PUMPLUN, S. and UNGER, T. Space-time Block Codes from Nonassociative Division Algebras. Advances in Mathematics of Communications, 2011, vol. 5 no. 3, p. 449–471. https://doi.org/10.3934/amc.2011.5.449.

UNGER, T. and MARKIN, N. Quadratic Forms and Space-Time Block Codes from Generalized Quaternion and Biquaternion Algebras. IEEE Transactions on Information Theory, 2011, vol. 57, no. 9, p. 6148–6156. ISSN 0018-9448, https://doi.org/10.1109/TIT.2011.2161909.

IMAI, Y. and ISEKI, K. On Axiom Systems of Propositional Calculi. Proceedings of the Japan Academy, 1966, vol. 42, p. 19–22. https://doi.org/10.3792/pja/1195522169.

JUN, Y.B. and Song, S.Z. Codes Based on BCK-algebras. Information Sciences, 2011, vol. 181, no. 22, p. 5102–5109. https://doi.org/10.1016/j.ins.2011.07.006.

FLAUT, C. BCK-algebras Arising from Block-codes. Journal of Intelligent & Fuzzy Systems, 2015, vol. 28, p. 1829–1833. https://doi.org/10.3233/IFS-141469.

Downloads

Published

15-03-2019

Issue

Section

Technical Information

Categories

How to Cite

Flaut, C., Flaut, D., Hoskova-Mayerova, S., & Vasile, R. (2019). From Old Ciphers to Modern Communications. Advances in Military Technology, 14(1), 79-88. https://doi.org/10.3849/aimt.01281

Similar Articles

61-70 of 137

You may also start an advanced similarity search for this article.